Eskenzi PR ad banner Eskenzi PR ad banner

Cloud Security

Read our Cloud Security News including features, how-tos, information, interviews and breaking news on the fast-growing industry. IT Security Guru is made up of a team of industry experts, providing daily news and insights into cloud security, cloud computing, exploits and vulnerabilities. For any queries relating to Cloud Security News, please contact our editorial team at [email protected]

IT Security

UKCloud, the multi-cloud experts dedicated to making transformation happen across UK public sector, has today announced that it is embedding CyberScore into its portfolio of core capabilities in order to help organisations improve their cyber security health. As organisations start to transform by adopting various cloud platforms and software services, in addition to managing their existing IT infrastructure, common tooling for operations, monitoring and cyber capabilities is essential. UKCloud’s platforms which are capable of hosting...

Read more
Head In The Clouds: Humans Cause Nine Out Of Ten Data Breaches In The Cloud.

Incidents in public cloud infrastructure are more likely to happen because of a customer’s employees rather than actions carried out by cloud providers, according to a new Kaspersky Lab report –‘Understanding security of the cloud: from adoption benefits to threats and concerns’. Companies expect cloud providers to be responsible for the safety of data stored on their cloud platforms. However, around 90% (SMBs (88%) and enterprises (91%)) of corporate data breaches in the cloud happen...

Read more
Accenture Helps Del Monte Foods Unlock Innovation and Drive Business Growth with The Cloud

Accenture (NYSE: ACN) has helped Del Monte Foods, Inc. gain more visibility into its IT operations, access real-time customer insights to inform decision making, reduce IT spending costs by up to 35 percent, and increase operating efficiencies by significantly reducing the time it takes for its professionals to receive IT capabilities, service and support from weeks to less than an hour. Del Monte Foods’ IT transformation journey arrives at a time when the company is...

Read more
Poor Or Non-Existent Cloud Security Placing One In Five Businesses At Risk.

Lack of confidence and skills holding businesses back when it comes to cloud security New analysis from Intercity Technology has revealed that only 18% of organisations have a fully comprehensive cloud security solution in place. The enterprise mobility, cloud and IT specialist canvassed the views of IT professionals across a range of sectors, and uncovered that many businesses are still struggling to put in place and maintain cloud security solutions. 45% stated that implementing the...

Read more
Proofpoint Research Reveals 65% Increase In Cloud Application Attacks In Q1 2019; 40% Of Attacks Originating From Nigeria.

Proofpoint, Inc., a leading cybersecurity and compliance company, today released its Cloud Application Attack Snapshot: Q1 2019 research, which examined over one hundred thousand cloud application attacks aimed at global organizations between September 2018 and February 2019. Overall, targeting attempts increased by 65 percent during that time period with 40 percent originating in Nigeria. China was the second most prevalent country of origin, with 26 percent of attacks originating from Chinese IP addresses. Cloud application...

Read more
Zscaler Releases Semi-Annual Cloud Security Insights Report.

Zscaler, Inc., the leader in cloud security, announced today the release of its semi-annual 2019 Cloud Security Insights Threat Report – An Analysis of SSL/TLS-based Threats, which examines encrypted traffic across the Zscaler™ cloud from July through December 2018. The report, compiled by the ZscalerTM ThreatLabZ research team, delves into a variety of attacks executed over SSL and blocked by Zscaler, including phishing attacks, botnets, browser exploitation, and malicious content. As the use of SSL...

Read more
Gemalto Expands Cloud HSM On Demand Solutions.

Gemalto, the world leader in digital security, today announced the availability of three new cloud-based Hardware Security Module (HSM) services, HSM On Demand for CyberArk, HSM On Demand for Hyperledger and HSM On Demand for Oracle TDE. Each service is available through the SafeNet Data Protection on Demand platform, a marketplace of cloud-based HSM, encryption and key management services that easily integrates with most widely used cloud services and IT products to protect data wherever...

Read more
CyberArk Launches Industry’s First Privileged Access Security Solution For Continuous Discovery And Protection In The Cloud.

CyberArk (NASDAQ: CYBR), the global leader in privileged access security, today announced ground-breaking new capabilities to simplify the continuous discovery and protection of privileged accounts in cloud environments. The CyberArk Privileged Access Security Solution v10.8 is the first-of-its-kind to automate detection, alerting and response for unmanaged and potentially-risky Amazon Web Services (AWS) accounts. This version also features new industry-leading Just-in-Time capabilities that deliver flexible user access to cloud-based or on-premises Windows systems. According to Gartner,...

Read more
CrowdStrike Announces Industry’s First Endpoint Detection And Response Solution For Mobile Devices.

CrowdStrike® Inc., the leader in cloud-delivered endpoint protection, today announced CrowdStrike Falcon® for Mobile, the first enterprise endpoint detection and response (EDR) solution for mobile devices. Based on CrowdStrike’s proven EDR technology for enterprise endpoints, Falcon for Mobile enables security teams to hunt for advanced threats on mobile devices and provides unprecedented visibility into malicious, unwanted, or accidental access to sensitive corporate data, while protecting user privacy and without impacting device performance. Leveraging CrowdStrike’s cloud-native...

Read more
74% Of Data Breaches Involve Privileged Credential Abuse.

Centrify, a leading provider of cloud-ready Zero Trust Privilege to secure modern enterprises, today announced results of a new survey revealing that most IT decision makers are not prioritising Privileged Access Management (PAM) practices and solutions, despite knowing privileged credential abuse is involved in almost three out of every four breaches. The survey of 1,000 IT decision makers, 500 from the U.K. and 500 from the U.S. found that, of those whose organisations have experienced...

Read more
Page 5 of 10 1 4 5 6 10